header

Crisis and escalation in cyberspace / (Record no. 78415)

MARC details
000 -LEADER
fixed length control field 05468nam a2200469 i 4500
001 - CONTROL NUMBER
control field ebr10818055
003 - CONTROL NUMBER IDENTIFIER
control field CaPaEBR
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS--GENERAL INFORMATION
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cn|||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 121116s2012 caua ob 000 0 eng|d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Cancelled/invalid ISBN 9780833076786 (pbk. : alk. paper)
International Standard Book Number 9780833076793 (e-book)
040 ## - CATALOGING SOURCE
Original cataloging agency CaPaEBR
Language of cataloging eng
Description conventions rda
-- pn
Transcribing agency CaPaEBR
043 ## - GEOGRAPHIC AREA CODE
Geographic area code n-us---
050 14 - LIBRARY OF CONGRESS CALL NUMBER
Classification number U163
Item number .L518 2012eb
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 358.4/141
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Libicki, Martin C.
245 10 - TITLE STATEMENT
Title Crisis and escalation in cyberspace /
Statement of responsibility, etc Martin C. Libicki.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Santa Monica, CA :
Name of producer, publisher, distributor, manufacturer RAND, Project Air Force,
Date of production, publication, distribution, manufacture, or copyright notice 2012.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (199 pages) :
Other physical details illustrations (some color)
336 ## - CONTENT TYPE
Content type term text
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Source rdacarrier
500 ## - GENERAL NOTE
General note "Prepared for the United States Air Force."
General note "Approved for public release; distribution unlimited."
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references (pages 163-172).
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Avoiding crises by creating norms -- Narratives, dialogues, and signaling -- Escalation management -- Strategic stability -- Conclusions and recommendations for the Air Force -- Introduction -- Some hypothetical crises -- Mutual mistrust is likely to characterize a cyber crisis -- States may have room for maneuver in a cyber crisis -- A note on methodology -- Purpose and organization -- Avoiding crises by creating norms -- What kind of norms might be useful? -- Enforce laws against hacking -- Disassociate from freelance hackers -- Discourage commercial espionage -- Be careful about the obligation to suppress cyber traffic -- How do we enforce norms? -- Confidence-building measures -- Norms for victims of cyberattacks -- Norms for war? -- Deception -- Military necessity and collateral damage -- Proportionality -- Reversibility -- Conclusions -- Narratives, dialogue, and signals -- Narratives to promote control -- A narrative framework for cyberspace -- Victimization, attribution, retaliation, and aggression -- Victimization -- Attribution -- Retaliation -- Aggression -- Emollients: narratives to walk back a crisis -- We did nothing -- Well, at least not on our orders -- It was an accident -- This is nothing new -- At least it does not portend anything -- Broader considerations -- Signals -- Ambiguity in signaling -- Signaling resolve -- Signaling that cyber combat is not kinetic combat -- Conclusions -- Escalation management -- Motives for escalation -- Does escalation matter? -- Escalation risks -- Escalation risks in phase -- Escalation risks for contained local conflicts -- Escalation risks for uncontained conflicts -- Managing proxy cyberattacks -- What hidden combatants imply for horizontal escalation -- Managing overt proxy conflict -- The difficulties of tit-for-tat management -- The importance of pre-planning -- Disjunctions among effort, effect, and perception -- Inadvertent escalation -- Escalation into kinetic warfare -- Escalation into economic warfare -- Sub rosa escalation -- Managing the third-party problem -- The need for a clean shot -- Inference and narrative -- Command and control -- Commanders -- Those they command -- Conclusions -- Implications for strategic stability -- Translating sources of cold war instability to cyberspace -- What influence can cyberwar have if nuclear weapons exist? -- Can cyberwar disarm another state's nuclear capabilities? -- Can cyberwar disarm another states cyberwarriors? -- Does cyberwar lend itself to alert-reaction cycles? -- Are cyberdefenses inherently destabilizing? -- Would a cyberspace arms races be destabilizing? -- Misperception as a source of crisis -- Side takes great exception to cyberespionage -- Defenses are misinterpreted as preparations for war -- Too much confidence in attribution -- Too much confidence in or fear of pre-emption -- Supposedly risk-free cyberattacks -- Neutrality -- Conclusions -- Can cyber crises be managed? -- A. Distributed denial-of-service attacks -- B. Overt, obvious, and covert cyberattacks and responses -- Can good cyberdefenses discourage attacks? -- Bibliography -- Figures -- Figure 1: Alternative postures for a master cyber narrative -- Figure 2: Sources of imprecision in tit for tat -- Figure 3: An inadvertent path to mutual escalation -- Figure A-1: Configuring networks to limit the damage of DDoS attacks -- Table -- Overt, obvious, and covert cyberattacks and responses.
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note Description based on print version record.
590 ## - LOCAL NOTE (RLIN)
Local note Electronic reproduction. Palo Alto, Calif. : ebrary, 2014. Available via World Wide Web. Access may be limited to ebrary affiliated libraries.
610 10 - SUBJECT ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element United States.
Subordinate unit Air Force
General subdivision Organization.
Corporate name or jurisdiction name as entry element United States.
Subordinate unit Air Force
General subdivision Decision making.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Information warfare
Geographic subdivision United States.
Topical term or geographic name as entry element Escalation (Military science)
Topical term or geographic name as entry element Cyberspace
General subdivision Security measures.
Topical term or geographic name as entry element Crisis management
General subdivision Government policy
Geographic subdivision United States.
Topical term or geographic name as entry element Cyberterrorism
General subdivision Prevention.
Topical term or geographic name as entry element Conflict management.
655 #0 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Print version:
Main entry heading Libicki, Martin C.
Title Crisis and escalation in cyberspace.
Place, publisher, and date of publication Santa Monica, CA : RAND, Project Air Force, 2012
Physical description xxvi, 172 pages ; 23 cm
International Standard Book Number 9780833076786
Record control number (DLC) 2012046227
797 2# - LOCAL ADDED ENTRY--CORPORATE NAME (RLIN)
Corporate name or jurisdiction name as entry element ebrary.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="http://site.ebrary.com/lib/rucke/Doc?id=10818055">http://site.ebrary.com/lib/rucke/Doc?id=10818055</a>
Public note An electronic book accessible through the World Wide Web; click to view

No items available.

© 2026 Rongo University
Contact us: librarian | system librarian | Rongo university